Dynamic data package access for mobile device
A device includes a processor configured to detect that a mobile device is within a coverage area of a wireless transceiver. The processor is also configured to select, based at least in part on a mobile device identifier of the mobile device, a data package identifier from a plurality of data package identifiers. The device also includes the wireless transceiver. The wireless transceiver is configured to transmit a command instructing the mobile device to access a data package corresponding to the selected data packet identifier. The command includes authorization data indicating that the processor is a trusted source.
Latest THE BOEING COMPANY Patents:
The present disclosure is related to a mobile device that accesses a data package.
BACKGROUNDIn a manufacturing environment, different devices are interconnected and exchange data via a network (e.g., an Internet of Things (TOT) network). In some scenarios, a mobile device entering the manufacturing environment is not equipped with assets (applications, files, multimedia, etc.) to perform different tasks. Thus, the assets have to be manually installed at the mobile device after the mobile device enters the manufacturing environment, if the mobile device is to perform tasks associated with the assets. To illustrate, an end-user of the mobile device can navigate an asset installation repository (e.g., an application store) to download the assets used to perform the tasks. However, the end-user would need foreknowledge of the assets and the location of the assets in the asset installation repository.
SUMMARYAccording to one implementation of the present disclosure, a device includes a wireless transceiver and a processor configured to detect that a mobile device is within a coverage area of the wireless transceiver. The processor is also configured to select, based at least in part on a mobile device identifier of the mobile device, a data package identifier from a plurality of data package identifiers. The wireless transceiver is configured to transmit a command instructing the mobile device to access a data package corresponding to the selected data packet identifier. The command includes authorization data indicating that the processor is a trusted source.
According to another implementation of the present disclosure, a method includes transmitting, from a mobile device to an access point, a mobile device identifier of the mobile device. The method also includes receiving, at the mobile device from the access point, a command indicating a data package identifier. The data package identifier is selected based on the mobile device identifier, and the command includes authorization data. The method also includes determining, based on the authorization data, that the access point is a trusted source. The method further includes accessing a data package corresponding to the data package identifier in response to the determination.
According to another implementation of the present disclosure, a computer-readable storage device stores instructions that, when executed by a processor, cause the processor to perform operations including detecting that a mobile device is within a coverage area of a wireless transceiver. The operations also include selecting, based at least in part on a mobile device identifier of the mobile device, a data package identifier from a plurality of data package identifiers. The operations further include initiating transmission of a command instructing the mobile device to access a data package corresponding to the selected data packet identifier. The command includes authorization data indicating that the processor is a trusted source.
One advantage of the above-described implementation includes efficient data package delivery to an end-user of a mobile device entering into an environment. For example, because an access point transmits a data package identifier to the mobile device in response to receiving a mobile device identifier, the mobile device can identify the data package (used to perform tasks) without an end-user having to manually access a data package repository. Additionally, the end-user of the mobile device does not need foreknowledge of the data package and the location of the data package in order for the mobile device to receive the data package. As a result, the data package is more efficiently delivered to the mobile device (compared to a manual process). Additionally, the features, functions, and advantages that have been described can be achieved independently in various implementations or may be combined in yet other implementations, further details of which are disclosed with reference to the following description and drawings.
Particular embodiments of the present disclosure are described below with reference to the drawings. In the description, common features are designated by common reference numbers throughout the drawings.
The figures and the following description illustrate specific exemplary embodiments. It will be appreciated that those skilled in the art will be able to devise various arrangements that, although not explicitly described or shown herein, embody the principles described herein and are included within the scope of the claims that follow this description. Furthermore, any examples described herein are intended to aid in understanding the principles of the disclosure and are to be construed as being without limitation. As a result, this disclosure is not limited to the specific embodiments or examples described below, but by the claims and their equivalents.
The techniques described herein enable a mobile device, upon entering an environment, to dynamically access remote data packages that are used to configure the mobile device according to the environment. As a non-limiting example, the mobile device enters into an information-rich manufacturing environment. Upon entering the manufacturing environment, the mobile device lacks assets (e.g., applications, files, multi-media, etc.) to perform tasks within the manufacturing environment. To obtain the assets (or data packages associated with the assets), the mobile device transmits a mobile device identifier to an access point associated with the manufacturing environment. According to one implementation, the mobile device identifier is transmitted in a beacon using a low-energy transmission protocol (e.g., a BLUETOOTH® communication protocol). BLUETOOTH® is a registered trademark owned by BLUETOOTH SIG, INC., a Delaware corporation. Based on the mobile device identifier, the access point identifies at least one data package for the mobile device to access from a server. For example, the access point selects a data package that, upon reception at the mobile device, enables the mobile device to perform the tasks. The access point transmits a data package identifier (identifying the data package) to the mobile device. Upon receiving the mobile device identifier, in some instances, the access point verifies that a user associated with the mobile device has a proper authorization (e.g., security clearance) to receive the remote data packages prior to sending the data package identifier to the mobile device. According to some implementation, the access point verifies a list of credentials as part of a data package request to prevent unauthorized data transmission. The list of credentials may include employee identification, certifications, an indication of role responsibility, a job assignment, etc.
Upon reception of the data package identifier, the mobile device transmits a data package request to the server to receive the data package indicated by the data package identifier. In some scenarios, the data package request includes the data package identifier. Upon reception of the data package request, the server transmits the data package to the mobile device, and the mobile device uses information in the data package to perform the tasks. As a non-limiting example, the data package can include configuration settings, and the mobile device can use the configuration settings to configure an operating system of the mobile device to perform the tasks. As another non-limiting example, the data package can include multimedia (e.g., a tutorial video associated with operating equipment in the manufacturing environment), and the mobile device can playback the content to enable the user to perform the tasks (e.g., operate the equipment).
According to one implementation, the mobile device 120 corresponds to a single mobile device associated with a group of mobile devices proximate to coverage area of the access point 110. For example, referring to
According to
According to one implementation, the coverage area 202 corresponds to a manufacturing factory that supports different devices (e.g., different mobile devices). Each of the mobile devices 120A, 120B, 120C within the coverage area 202 (and the server 130) can exchange data. Thus, in one implementation, the coverage area 202 corresponds to an internet-of-things (TOT) network that enables the mobile devices 120A, 120B, 120C and the server 130 to exchange data.
However, because each mobile device 120A, 120B, 120C within the coverage area 202 is of a different type (e.g., different model), each mobile device 120A, 120B, 120C is associated with a different configuration. To illustrate, the mobile device 120A is an augmented reality device, the mobile device 120B is a laptop, and the mobile device 120C is a personal digital assistant (PDA). Thus, the mobile device 120A is associated with a first configuration related to augmented reality devices, the mobile device 120B is associated with a second configuration related to laptops, and the mobile device 120C is associated with a third configuration related to PDAs. Because each mobile device 120A, 120B, 120C is associated with a different configuration, different operating systems can be installed on each mobile device 120A, 120B, 120C or different versions of an operating system can be installed on each mobile device 120A, 120B, 120C. Additionally, each mobile device 120A, 120B, 120C can have different hardware specifications or different software specifications. The techniques described herein enable each mobile device 120A, 120B, 120C to access a unique data package (related to the corresponding configuration) upon entering the coverage area 202.
Referring back to
Upon entering the coverage area 202, the mobile device 120 is configured to transmit a mobile device identifier 152 to the access point 110. For example, the mobile device identifier 152 is stored in the memory 122 of the mobile device 120. The mobile device identifier 152 includes identity information associated with the mobile device 120. As a non-limiting example, the mobile device identifier 152 includes a product key of the mobile device 120, a credential key of an end-user associated with the mobile device 120, a key representing the end-user has fulfilled particular prerequisites (e.g., safety prerequisites) to work in the environment, etc. The processor 124 is configured to retrieve the mobile device identifier 152 from the memory 122, and the wireless transceiver 126 is configured to transmit the mobile device identifier 152 to the access point 110.
The access point 110 includes a memory 112, a processor 114 coupled to the memory 112, and a wireless transceiver 116 coupled to the processor 114. The memory 112 is a computer-readable storage device that stores instructions 140 that are executable to cause the processor 114 to perform operations. The processor 114 includes a mobile device detection circuit 144, a data package identifier selector 146, and a command generator 148.
The access point 110 is configured to detect that the mobile device 120 is within the coverage area 202. For example, the wireless transceiver 116 of the access point 110 is configured to receive the mobile device identifier 152 from the mobile device 120. The mobile device detection circuit 144 is configured to process (e.g., decode, identify, etc.) the mobile device identifier 152 to determine that the mobile device 120 is within the coverage area 202. As a non-limiting example, the mobile device detection circuit 144 identifies the product key of the mobile device identifier 152 and determines that the mobile device 120 is within the coverage area 202 in response to identifying the product key. According to some implementations, the mobile device 120 sends a user verification package 190 to the server 130 upon detecting the access point 110. The user verification package includes user information that is used to authenticate the user of the mobile device 120.
In response to detection of the mobile device 120, the data package identifier selector 146 is configured to select a data package identifier 108 based at least in part on the mobile device identifier 152. To illustrate, the memory 112 of the access point 110 stores a plurality of data package identifiers 142. According to one implementation, each data package identifier of the plurality of data package identifiers 142 is associated with a different mobile device. To illustrate, the data package identifier 108 is associated with the mobile device 120, a different data package identifier (not shown) of the plurality of data package identifiers 142 is associated with the mobile device 120B, and a different data package identifier (not shown) of the plurality of data package identifiers 142 is associated with the mobile device 120C. The data package identifier 108 indicates a data package (stored at the server 130) designated for the mobile device 120. As described below, the mobile device 120 uses the data package (indicated by the data package identifier 108) for different operations (e.g., configuration operations, installation operations, content-based operations, etc.).
According to one implementation, the data package identifier 108 is selected based at least in part on a determination that a user associated with the mobile device 120 has a level of security clearance that satisfies a security clearance threshold associated with the data package. As a non-limiting example, the data package (indicated by the data package identifier 108) can include sensitive information that is available to personnel with a high security clearance. Based on the mobile device identifier 152, the data package identifier selector 146 can determine whether the user associated with the mobile device 120 has the level of security clearance that satisfies the security clearance threshold.
According to another implementation, the data package (indicated by the data package identifier 108) is associated with an item (e.g., a manufacturing item, a software item, a hardware item, tools, etc.). The data package identifier selector 146 selects the data package identifier 108 based on at least one of two criteria. For example, in response to a determination that item catalogue data indicates that the item is checked out to a user that is associated with the mobile device 120, the data package identifier selector 146 selects the data package identifier 108. To illustrate, if the item catalogue data indicates that a mechanic using the mobile device 120 checked out a particular tool (e.g., a wrench), the data package identifier selector 146 selects the data package identifier 108 because the data package identifier 108 corresponds to a data package associated with the particular tool. As another example, in response to a determination (or detection) that the item is within the coverage area 202 of the wireless transceiver 116, the data package identifier selector 146 selects the data package identifier 108.
According to another implementation, the data package identifier 108 is selected based other criteria. As a non-limiting example, the data package identifier 108 is selected in response to a determination that the data package (indicated by the data package identifier 108) is associated with a model of the mobile device 120. As another non-limiting example, the data package identifier 108 is selected based on a type of operating system installed on the mobile device 120. As another non-limiting example, the data package identifier 108 is selected based a version of the operating system installed on the mobile device 120. The data package identifier 108 can also be selected based on a hardware specification of the mobile device 120, a software specification of the mobile device 120, or both.
After the data package identifier selector 146 selects the data package identifier 108, the command generator 148 is configured to generate a command 106 that instructs the mobile device 120 to access the data package indicated by the data package identifier 108. To illustrate, the data package identifier 108 is included in the command 106. Additionally, authorization data 109 is included in the command 106. The authorization data 109 indicates that the processor 114 (or the access point 110) is a trusted source. The wireless transceiver 116 is configured to transmit the command 106 to the mobile device 120. According to one implementation, the command 106 is included in a beacon 107 that is communicated using a wireless communication protocol.
The wireless transceiver 126 is configured to receive the command 106. Upon reception of the command 106, the source verifier 154 is configured to determine whether the access point 110 is a trusted source. For example, the source verifier 154 is configured to process (e.g., decode) the authorization data 109 to determine that the access point 110 is a trusted source. In response to determining that the access point 110 is a trusted source, the data package request generator 156 is configured to access a data package 162 corresponding to the data package identifier 108. For example, the data package request generator 156 is configured to generate a data package request 158 based on the data package identifier 108. After the data package request 158 is generated, the wireless transceiver 126 is configured to send the data package request 158 to the server 130.
The server 130 includes a memory 132, a processor 134 coupled to the memory 132, and a wireless transceiver 136 coupled to the processor 134. A plurality of data packages 160 is stored in the memory 132. The plurality of data packages 160 includes a data package 162 and a data package 164. Although two data packages 162, 164 are illustrated in
The wireless transceiver 136 is configured to receive the data package request 158 from the mobile device 120. Upon reception of the data package request 158, the processor 134 is configured to retrieve the data package 162 (from the memory 132) that is associated with the data package request 158. To illustrate, the processor 134 is configured to process (e.g., decode) the data package request 158 to identify the corresponding data package 162 located in the memory 132. After the processor 134 identifies the data package 162, the processor 134 retrieves the data package 162 from the memory 132 and initiates transmission of the data package 162 to the mobile device 120. The wireless transceiver 136 is configured to transmit the data package 162 to the mobile device 120.
The wireless transceiver 126 is configured to receive the data package 162 from the server 130. Upon reception of the data package 162, the data processing circuitry 157 is configured to perform operations (e.g., configuration operations, installation operations, content-based operations, etc.) at the mobile device 120 using information included in the data package 162. The operations are described using different implementations of the data package 162, as described with respect to
Referring to
Referring to
Referring to
The techniques described with respect to
As a non-limiting example, content illustrating how to operate a particular tool can be delivered in an efficient manner to a mechanic operating the mobile device 120. To illustrate, the mechanic operating the mobile device 120 enters a manufacturing environment. Upon entering into a manufacturing environment, the mobile device 120 sends the mobile device identifier 152 to the access point 110, and the access point 110 determines that a particular tool is checked out to a user (e.g., the mechanic) of the mobile device 120. Based on the determination, the access point 110 sends the data package identifier 108 to the mobile device 120 to identify a data package (e.g., the data package 162) associated with particular tool. For example, data package 162 can include content (e.g., an instruction manual) for the particular tool. The mobile device 120 sends the data package request 158 (including the data package identifier 108) to the server 130, and the server 130 sends the data package 162 to the mobile device 120. As a result, the mechanic can view the instruction manual at the mobile device 120.
Referring to
The mobile device 120 is configured to transmit a first message 450 to the access point 110. The first message requests activation of an application 412 at the media device 410. To illustrate, the processor 124 generates the first message 450 and includes a media device identifier 452 in the first message 450. According to one implementation, the media device identifier 452 is included in the data package 162 received from the server 130. The media device identifier 452 includes identification information associated with the media device 410 and identification information associated with the application 412. As a non-limiting example, the media device identifier 452 includes a product key of the media device 410. According to one implementation, the first message 450 includes credentials associated with the user of the mobile device 120. To illustrate the first message 450 can include security credentials of the user. The wireless transceiver 126 is configured to transmit the first message 450 to the access point 110 after generation of the first message 450. According to one implementation, the first message 450 is transmitted from the mobile device 120 to the access point 110 in response to a determination that the media device 410 is within a coverage area of the mobile device 120 (e.g., within the coverage area 202).
The wireless transceiver 116 is configured to receive the first message 450 from the mobile device 120. Upon reception of the media device identifier 452 in the first message 450, the processor 114 is configured to identify a device that is capable of activating the application 412 (e.g., identify a device that can activate applications stored at the media device 410). As a non-limiting example, the processor 114 determines that the second device 420 has the capability of activating the application 412. As a result, the processor 114 generates a second device identifier 454. The wireless transceiver 116 is configured to transmit the second device identifier 454 to the mobile device 120.
The wireless transceiver 126 is configured to receive the second device identifier 454 from the access point 110. Upon reception of the second device identifier 454, the processor 124 is configured to generate a second message 460 that requests the second device 420 to activate the application 412 at the media device 410. For example, an activation request 462 is included in the second message 460. The wireless transceiver 126 is configured to send the second message 460 to the second device 420. Different implementations of the second message 460 are described with respect to
Referring to
Referring to
Referring to
The second device includes a memory 422, a processor 424 coupled to the memory 422, and a wireless transceiver 426 coupled to the processor 424. Upon reception of the second message 460, the processor 424 is configured to activate the application 412 at the media device 410. In response to activation of the application 412, the processor 424 is configured to generate a notification 464 indicating that the application 412 has been activated. The wireless transceiver 426 is configured to transmit the notification 464 to the mobile device 120.
Thus, the techniques described with respect to
As a non-limiting example, the application 412 can be an instructional video displayed at the media device 410. The instructional video details how to use a particular piece of manufacturing equipment. According to the non-limiting example, the second device 420 is a video server that is configured to activate the instructional video at the media device 410. If a user of the mobile device 120 lacks the foreknowledge that the second device 420 is configured to activate the instructional video, the mobile device 120 sends the media device identifier 452 (of the media device 410) to the access point 110, and the access point 110 indicates (to the mobile device 120 using the second device identifier 454) that the second device 420 is configured to operate the media device 410. Based on the indication, the mobile device 120 requests the second device 420 to play the instructional video.
Referring to
The method 600 includes detecting that a mobile device is within a coverage area of a wireless transceiver, at 602. For example, referring to
The method 600 also includes selecting, based at least in part on a mobile device identifier of the mobile device, a data package identifier from a plurality of data package identifiers, at 604. For example, referring to
The method 600 also includes transmitting a command instructing the mobile device to access a data package corresponding to the selected data packet identifier, at 606. The command includes authorization data that indicates that the access point is a trusted source. For example, referring to
Referring to
The method 700 includes transmitting, from a mobile device to an access point, a mobile device identifier of the mobile device, at 702. For example, referring to
The method 700 also includes receiving, at the mobile device from the access point, a command indicating a data package identifier, at 704. The data package identifier is selected based on the mobile device identifier, and the command includes authorization data. For example, referring to
The method 700 also includes determining, based on the authorization data, that the access point is a trusted source, at 706. For example, referring to
The method 700 also includes accessing a data package corresponding to the data package identifier in response to the determination, at 708. For example, referring to
According to one implementation, the method 700 also includes transmitting, from the mobile device to the access point, a first message requesting activation of an application at a media device. The message includes a media device identifier of the media device. The method 700 also includes receiving, at the mobile device from the access point, an identifier of a second device that is configured to activate the application at the media device. The method 700 also include sending, from the mobile device to the second device, a second message requesting activation of the application at the media device. The second message includes at least one of the media device identifier, mobile device authorization data that indicates the mobile device is authorized to access the application, or an application identifier of the application.
The methods 600, 700 of
The illustrations of the examples described herein are intended to provide a general understanding of the structure of the various implementations. The illustrations are not intended to serve as a complete description of all of the elements and features of apparatus and systems that utilize the structures or methods described herein. Many other implementations may be apparent to those of skill in the art upon reviewing the disclosure. Other implementations may be utilized and derived from the disclosure, such that structural and logical substitutions and changes may be made without departing from the scope of the disclosure. For example, method operations may be performed in a different order than shown in the figures or one or more method operations may be omitted. Accordingly, the disclosure and the figures are to be regarded as illustrative rather than restrictive.
Moreover, although specific examples have been illustrated and described herein, it should be appreciated that any subsequent arrangement designed to achieve the same or similar results may be substituted for the specific implementations shown. This disclosure is intended to cover any and all subsequent adaptations or variations of various implementations. Combinations of the above implementations, and other implementations not specifically described herein, will be apparent to those of skill in the art upon reviewing the description.
The Abstract of the Disclosure is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. In addition, in the foregoing Detailed Description, various features may be grouped together or described in a single implementation for the purpose of streamlining the disclosure. Examples described above illustrate but do not limit the disclosure. It should also be understood that numerous modifications and variations are possible in accordance with the principles of the present disclosure. As the following claims reflect, the claimed subject matter may be directed to less than all of the features of any of the disclosed examples. Accordingly, the scope of the disclosure is defined by the following claims and their equivalents.
Claims
1. A device comprising:
- a processor of a wireless transceiver, the processor configured to: receive a device identifier from a mobile device in a coverage area of the wireless transceiver, wherein the device identifier includes a product key for the mobile device and a credential key for an end-user associated with the mobile device; determine that an item different than the mobile device is associated with the end-user; select, based on the credential key, particular data associated with the item, the particular data including instructions for operation of the item; and select, based on the product key, a data package identifier from a plurality of data package identifiers, the data package identifier identifying a data package associated with the particular data that is usable by the mobile device; and
- the wireless transceiver configured to transmit a command instructing the mobile device to access the data package from a server, the command including authorization data indicating that the processor is a trusted source.
2. The device of claim 1, wherein the data package includes a configuration setting, and wherein the command further instructs the mobile device to update a configuration of the mobile device based on the configuration setting.
3. The device of claim 1, wherein the data package includes an application, and wherein the command further instructs the mobile device to install the application at the mobile device.
4. The device of claim 1, wherein the data package includes content, and wherein the command further instructs the mobile device to at least one of display the content, send the content to an application, or store the content in a memory.
5. The device of claim 1, wherein the wireless transceiver is further configured to:
- receive a first message from the mobile device requesting activation of an application at a media device; and
- in response to receiving the first message, transmit an identifier of a second device to the mobile device, the second device configured to activate the application at the media device.
6. The device of claim 1, wherein the data package identifier is selected based at least in part on determining that the end-user has a level of security clearance that satisfies a security clearance threshold associated with the data package.
7. The device of claim 1, wherein the processor determines that the item is associated with the end-user by making a determination that item catalogue data indicates that the item is checked out to the end-user.
8. The device of claim 1, wherein the processor determines that the item is associated with the end-user by detection of the item within the coverage area of the wireless transceiver.
9. The device of claim 1, wherein the data package identifier is selected based at least in part on determining that the data package is associated with a model of the mobile device, a type of an operating system installed on the mobile device, a version of the operating system, a hardware specification of the mobile device, or a software specification of the mobile device.
10. A method comprising:
- transmitting, from a mobile device to an access point, a mobile device identifier of the mobile device, wherein the mobile device identifier includes a product key for the mobile device and a credential key for an end-user associated with the mobile device;
- receiving, at the mobile device from the access point, a command indicating a data package identifier of a data package, the data package selected by the access point based on a determination that an item different than the mobile device is associated with the end-user, based on the credential key, and based on the product key, wherein the data package is associated with the item includes instructions for operation of the item, and wherein the command includes authorization data; and
- in response to a determination by the mobile device that the access point is a trusted source, accessing the data package corresponding to the data package identifier from a server.
11. The method of claim 10, further comprising:
- transmitting, from the mobile device to the access point, a first message requesting activation of an application at a media device, the first message including a media device identifier of the media device;
- receiving, at the mobile device from the access point, an identifier of a second device configured to activate the application at the media device; and
- sending, from the mobile device to the second device, a second message requesting activation of the application at the media device, the second message including at least one of the media device identifier, mobile device authorization data indicating that the mobile device is authorized to access the application, or an application identifier of the application.
12. The method of claim 11, wherein the first message is transmitted from the mobile device to the access point in response to determining that the media device is within a coverage area of the mobile device.
13. The method of claim 11, further comprising receiving a notification from the second device indicating that the application has been activated at the media device.
14. A computer-readable storage device storing instructions that, when executed by a processor, cause the processor to perform operations comprising:
- receiving a device identifier from a mobile device in a coverage area of a wireless transceiver, wherein the device identifier includes a product key for the mobile device and a credential key for an end-user associated with the mobile device;
- determining that an item different than the mobile device is associated with the end-user;
- selecting, based on the credential key, particular data associated with the item, the particular data including instructions for operation of the item;
- selecting, based on the product key, a data package identifier from a plurality of data package identifiers, the data package identifier identifying a data package associated with the particular data that is usable by the mobile device; and
- initiating transmission of a command instructing the mobile device to access the data package from a server, the command including authorization data indicating that the processor is a trusted source.
15. The computer-readable storage device of claim 14, wherein the data package includes a configuration setting, and wherein the command further instructs the mobile device to update a configuration of the mobile device based on the configuration setting.
16. The computer-readable storage device of claim 14, wherein the data package includes an application, and wherein the command further instructs the mobile device to install the application at the mobile device.
17. The computer-readable storage device of claim 14, wherein the data package includes content, and wherein the command further instructs the mobile device to at least one of display the content, send the content to an application, or store the content in a memory.
18. The computer-readable storage device of claim 14, wherein the data package identifier is selected based at least in part on determining that the end-user has a level of security clearance that satisfies a security clearance threshold associated with the data package.
19. The computer-readable storage device of claim 14, wherein the determining that the item is associated with the end-user comprises determining from an item catalogue that item catalogue data indicates that the item is checked out to the end-user.
20. The computer-readable storage device of claim 14, wherein the product key indicates one or more of a model of the mobile device, a type of an operating system installed on the mobile device, a version of the operating system, a hardware specification of the mobile device, or a software specification of the mobile device.
8224886 | July 17, 2012 | Visalli |
8311518 | November 13, 2012 | Fiorini |
8356251 | January 15, 2013 | Strober |
8635316 | January 21, 2014 | Barnhill, Jr. |
9489832 | November 8, 2016 | Nair |
10114670 | October 30, 2018 | Glatfelter |
10299342 | May 21, 2019 | Reddy |
20040142744 | July 22, 2004 | Atkinson |
20040205151 | October 14, 2004 | Sprigg |
20050075115 | April 7, 2005 | Corneille |
20060035707 | February 16, 2006 | Nguyen |
20060089542 | April 27, 2006 | Sands |
20060234698 | October 19, 2006 | Fok |
20060278694 | December 14, 2006 | Jha et al. |
20080064340 | March 13, 2008 | Whatmough |
20080076572 | March 27, 2008 | Nguyen |
20080215725 | September 4, 2008 | Backer |
20090017789 | January 15, 2009 | Thomas |
20090019167 | January 15, 2009 | Taaghol |
20090079537 | March 26, 2009 | Seitz |
20090132698 | May 21, 2009 | Barnhill, Jr. |
20090156165 | June 18, 2009 | Raghothaman |
20090184924 | July 23, 2009 | Uchida |
20090280792 | November 12, 2009 | Leblanc |
20100262467 | October 14, 2010 | Barnhill, Jr. |
20110082882 | April 7, 2011 | Denison |
20120191844 | July 26, 2012 | Boyns |
20120272148 | October 25, 2012 | Strober |
20130006869 | January 3, 2013 | Grab |
20130024542 | January 24, 2013 | Keller |
20130074163 | March 21, 2013 | Murakami |
20140143137 | May 22, 2014 | Carlson |
20140148205 | May 29, 2014 | Grinshpun |
20140214655 | July 31, 2014 | Smith |
20140237462 | August 21, 2014 | Zheng |
20140282257 | September 18, 2014 | Nixon |
20150029120 | January 29, 2015 | Sieckmann |
20150109967 | April 23, 2015 | Hogan |
20150304440 | October 22, 2015 | Zheng |
20150312361 | October 29, 2015 | Seo |
20160132046 | May 12, 2016 | Beoughter |
20160246617 | August 25, 2016 | Watsen |
20160274558 | September 22, 2016 | Strohmenger |
20160285953 | September 29, 2016 | Cao |
20160316419 | October 27, 2016 | Shyamalan |
20170208436 | July 20, 2017 | Caine |
20170220330 | August 3, 2017 | Soini |
20170317879 | November 2, 2017 | Wei |
20180024847 | January 25, 2018 | Campbell |
20180025304 | January 25, 2018 | Fisher |
20180107178 | April 19, 2018 | Nixon |
20180262891 | September 13, 2018 | Wu |
20180293823 | October 11, 2018 | Gillot |
20190236873 | August 1, 2019 | Estill |
20190334893 | October 31, 2019 | Chen |
20200030938 | January 30, 2020 | Knudson |
20200057654 | February 20, 2020 | Yang |
2016044119 | March 2016 | WO |
- Communication pursuant to Article 94(3) EPC for Application No. 16156561.3 dated Mar. 27, 2020, 8 pgs.
- “OMA Device Management Protocol; OMA-TS-DM_Protocol-V1_3-20160524-A”, OMA-TS-DM_PROTOCOL-V1_3-20160524-A, Open Mobile Alliance (OMA), 4330 La Jolla Village Dr., Suite 110San Diego, CA 92122; USA, No. 1.3 May 24, 2016, pp. 1-60, XP064189238, Retrieved from the Internet: URL:ftp/Public_documents/DM/DM-DM13/Permanent_documents/ [retrieved on Jun. 7, 2016].
- Communication pursuant to Article 94(3) EPC for Application No. 19156561.3 dated Sep. 3, 2020, pp. 1-10.
- European Search Report for Application No. EP 19156561 dated Apr. 26, 2019, 2 pgs.
Type: Grant
Filed: Mar 1, 2018
Date of Patent: Feb 2, 2021
Patent Publication Number: 20190274046
Assignee: THE BOEING COMPANY (Chicago, IL)
Inventors: Jeffrey H. Lierman (Mount Pleasant, SC), Brian W. Pippen (Charleston, SC), Robert L. Vitali (Summerville, SC), Mark J. Boyer (Placentia, CA), Paul R. Davies (Long Beach, CA), Brian D. Laughlin (Wichita, KS), Joseph Anelle (Weldon Springs, MO)
Primary Examiner: David Garcia Cervetti
Application Number: 15/909,065
International Classification: H04L 29/06 (20060101); H04W 12/08 (20090101); H04W 4/60 (20180101); G06F 8/61 (20180101); H04W 48/04 (20090101); H04W 8/24 (20090101); H04W 4/80 (20180101); H04L 29/08 (20060101); H04W 4/50 (20180101); H04W 12/06 (20090101);